The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2024
DOI: 10.1002/spe.3327
|View full text |Cite
|
Sign up to set email alerts
|

Organizations' readiness for insider attacks: A process‐oriented approach

Azzah A. AlGhamdi,
Mahmood Niazi,
Mohammad Alshayeb
et al.

Abstract: ContextOrganizations constantly strive to protect their assets from outsider attacks by implementing various security controls, such as data encryption algorithms, intrusion detection software, firewalls, and antivirus programs. Unfortunately, attackers strike not only from outside the organization but also from within. Such internal attacks are called insider attacks or threats, and the people responsible for them are insider attackers or insider threat agents. Insider attacks pose more significant risks and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 45 publications
(131 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?